IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager

    • ٢٫٠ - ١ تقييم

وصف الناشر

To comply with government and industry regulations, such as Sarbanes-Oxley, Gramm Leach Bliley (GLBA), and COBIT (which can be considered a best-practices framework), organizations must constantly detect, validate, and report unauthorized changes and out-of-compliance actions within the Information Technology (IT) infrastructure. Using the IBM® Tivoli Security Information and Event Manager solution organizations can improve the security of their information systems by capturing comprehensive log data, correlating this data through sophisticated log interpretation and normalization, and communicating results through a dashboard and full set of audit and compliance reporting.

In this IBM Redbooks® publication, we discuss the business context of security audit and compliance software for organizations and describe the logical and physical components of IBM Tivoli Security Information and Event Manager. We also present a typical deployment within a business scenario.

This book is a valuable resource for security officers, administrators, and architects who want to understand and implement a centralized security audit and compliance solution.

النوع
كمبيوتر وإنترنت
تاريخ النشر
٢٠١٠
١٦ يوليو
اللغة
EN
الإنجليزية
عدد الصفحات
٤٦٤
الناشر
IBM Redbooks
البائع
International Business Machines Corp
الحجم
٧٫٨
‫م.ب.‬
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
٢٠١٣
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
٢٠١١
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
٢٠١٤
CompTIA CySA+ Study Guide CompTIA CySA+ Study Guide
٢٠٢٣
Administration: Configuration and Security Administration: Configuration and Security
٢٠١٣
Microsoft System Center Microsoft System Center
٢٠١٣
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
٢٠٠٦
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
٢٠١٢
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
٢٠١٢
Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS
٢٠١١
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
٢٠٠٩
Big Data Networked Storage Solution for Hadoop Big Data Networked Storage Solution for Hadoop
٢٠١٣
Cloud Security Starter Kit – Overview Cloud Security Starter Kit – Overview
٢٠١١
The InfoSec Handbook The InfoSec Handbook
٢٠١٤
Security in Computer and Information Sciences Security in Computer and Information Sciences
٢٠١٨
Security of Networks and Services in an All-Connected World Security of Networks and Services in an All-Connected World
٢٠١٧
Information Security Management - ITP 370 Information Security Management - ITP 370
٢٠١٤
Managing Risk and Information Security Managing Risk and Information Security
٢٠١٣